Posts

Introduction to OSINT (Open Source Intelligence)

Image
The internet has changed everything around us from education, healthcare, government interactions reaching social communication which receives the greatest impact. The Internet has redefined how people communicate with each other and revolutionized how corporations do business. Nowadays, the majority of world communications happen in what is known as Cyberspace.  According to  c ybersecurity ventures ,  by 2030, 90 percent of the human population, aged 6 years and older will be online, this means more than 7.5 billion Internet users. People now use the internet to purchase goods & services, entertainment, connect with other people, share information and files in addition to using social networking websites to communicate with friends and family members without any geographical barriers.  As the world continues to digitalize, digital societies will produce huge amount of digital data generated from people and business interactions in Cyberspace. Exploiting th...

How to hack Databases Easily

Image
  Hey Noobs! You may have heard of password hacking using various methods such as phishing, brute-forcing but what if you hack an entire Database.!!! Don't it sound amazing and risky at the same time, but don't worry, I won't tell you that it requires a lot of knowledge and in fact, even you are a beginner, you can do this, you are an intermediate, you will find this article really helpful, if you are an advanced hacker, this will ease your work. So, let's get to our point, You might have heard name of sqlmap before. Sqlmap is the best tool to automate XSS (Cross-Site Scripting) and sql injection tool used by hackers worldwide. We will be using sqlmap in this tutorial but not in a traditional way, we gonna live hack an entire database in the simplest way it can be. So, there are some requirements for it, You need a computer or a mobile and a good internet connection with python installed in it. Yes! That's all you want. The first step :- Download DBJACK :- DBJACK is...

How to hack Android Remotely Using Kali/Windows/Mac (Step-By-Step Tutorial)

Image
  Detailed Tutorial On How To Remotely Hack Android Device Note :- Follow each steps carefully then you can successfully do it, but if you get any error. Don't forget to mention it in comments. 1.Download Metasploit-framework If you are on a Linux machine (Kali or Parrot), It comes pre-installed. Else, you can download it on Windows and Mac too from  metasploit.com .  2.Downlaod Ngrok If you don't know what ngrok is, ngrok is a port-forwarding tool which can transfer WAN Connections on LAN. You can download it from  ngrok.com . And sign up for service, you can see further steps on their websites itself to install it. 3.Make your payload Now, comes the main step to finally build our malicious .apk file to send to the victim and hack it. For this, you'll first have to fire up ngrok terminal by this command ngrok tcp 4242 You will get a screen like this one below Here, as you can see my host is 8.tcp.ngrok.io and port is 19466 (This can be different in your device) Lea...

How to scan your home network (or any network) for vulnerabilities

Vulnerability management is a key responsibility of any IT security team or  managed security service provider , and it involves assessing, mitigating (if necessary) and reporting on any security vulnerabilities that exist in an organization’s systems and software. But vulnerabilities can be managed only if they have been discovered and identified, and the way to achieve this is through a comprehensive vulnerability scanning program. What is vulnerability scanning? A vulnerability scanner is an application that identifies and creates an inventory of all the systems (including servers, desktops, laptops, virtual machines, containers, firewalls, switches, and printers) connected to a network. For each device that it identifies it also attempts to identify the operating system it runs and the software installed on it, along with other attributes such as open ports and user accounts. See our picks for  top vulnerability scanning tools  and  top vulnerability management s...

How to download Whatsapp Status without any app

Image
Hey there! Today, I will be showing you how you can download status of the well-known app used for communication 'WhatsApp'.  You can simply do it with any app but here's a way how you can  download it without any app. Ever wondered how you are able to see the viewed statuses even  you're offline. Whatsapp download that all media in your phone locally for a short period of time. So, let's see how you can download it. For this, first you'll have to view the status (when you're online) and then it'll automatically move into Whatsapp cache available in  your phone. Now head to the folder and from there you can  permanently save it in your phone (Even the person has removed it) This is a simple trick using which you can download the status you like. Try this out!

How to install Ubuntu In Windows without VirtualBox

Image
  Hey! Today, I will show how you can use Linux terminal in Windows Many of you may know about this feature of windows, Windows  allows users to run Linux distros on Windows using an in-built feature of windows which is 'Windows subsystem for Linux' It comes built in Windows8/10 (Beta versions in 7). So let's have  'BASH' in CMD. To do this, follow the below steps carefully :  search 'turn windows features on' in the search box You will see a windows like above, Now here search for 'windows subsystem for linux' Now check the checkbox in front of it to turn it on. Now, you may have to restart your PC to let this feature be effective. After restarting your pc, Open Microsoft store and search for Ubuntu You may choose any version of your choice but I'll recommend the  latest one. Wait for it to download and install, after installation is finished, you are ready to launch ubuntu on windows, Click the 'Launch' button to run it. Now it'll a...

How to use your Android phone as a Hacking Tool

Image
Hey there! Today, I will be showing you how you can turn your Android phone into a Hacking tool. All you need is an Android device and a good wi-fi connection. Yes!! That's all you need... To practice hacking using your android device, you will need to  install an app called Termux. TERMUX provides you with a good interface for hacking... You can simply install Termux through Google Play Store. Termux is used widely as a hacking tool for Android but if you are  not satisfied with it, here is something else for you You can use Kali Linux on Android YESS!!! Kali linux with root access For this, you will have to install two apps  1) VNC viewer 2)UserLand You will have to run UserLand and choose your favourite OS and then you will have to copy it's host ip username and password and open VNC viewer and enter it there in VNC viewer Congratulations!!!!! You have ran Kali Linux in your android device. If you have followed every steps above correctly, you are less  probable t...

Best way to hack any social media

Image
  Hey! Today, you gonna learn that how you can hack 30+ Social media accounts including Instagram, Facebook and WhatsApp too.... So let's get started :  There are many ways to hack any social media account like Brute-force, hashing and many more... But we will be going to use the best of these method which is very old but still working better than any other method. So, to hack victim's social media, you will need Kali linux or Termux (If you are on Android). First of all, we will need to install a tool : Blackeye Blackeye comes with already built-in phishing pages for many sites, so you won't have to create one on your own. To install blackeye :  git clone https://github.com/x3rz/blackeye  Now, you have successfully installed blackeye, now you will have to simply run it To do this,  cd blackeye  (change current directory to blackeye) Next, we will run blackeye :  bash blackeye.sh Now, you'll see a screen like this  Now, as you can see here are 33 ...

How to install metasploit-framework in Windows (7/8/10)

Image
How to install Metasploit in Windows (7/8/10) If you also want to use metasploit, but you are on a windows machine, then the best thing you can do is to install VirtualBox and Kali Linux in VirtualBox. But as it takes a lot of time and patience, so here's a quick solution for this. The process is way more simple than you think, you have to go to  metasploit.com  and download the latest windows installer from there itself. To use msfconsole directly from CMD, you will have to add metasploit to path,  Type in the search bar, 'view advanced system settings' and press enter. Click on 'Environment Variables' below. Now, add the path of the bin folder where you have installed metasploit-framework, By default, the path is 'c\metasploit-framework\bin\'. Hurray!!!!! You have successfully installed Metasploit-framework in your windows computer. If you have followed all the steps above, there should be any error, but if you faced any errors in installation, kindly drop...

How to hack Android Device remotely

Image
  Hey there! So, if  you want to get remote access to any Android device whether it's A7 or A10 or maybe A11. These are the simple steps to get you access you to any android device What you need for this? A PC and Metasploit-Framework installed in it. Kali comes with pre-installed Metasploit but if you are on windows and don't have it. Then read this article to learn  how to install metasploit framework in windows7/8/10  . Now, as you have Metasploit-framework, fire up CMD (windows) or Terminal (mac/Linux). Now type these commands to remotely hack android device. 1.ifconfig (mac/Linux) ipconfig (windows). You will se an output like this, now copy your IP address. We have to run a server on our machine to receive TCP signals. Type :  'service apache2 start' (Linux/mac)   in windows, you can use any port forwarding application like ngrok if you don't know how to use it, read this article about  how to port forward in windows  . Now, it's time to cre...